TY - CONF
T1 - OCTANE
T2 - 6th Workshop on Cyber Security Experimentation and Test, CSET 2013
AU - Everett, Christopher E.
AU - McCoy, Damon
N1 - Funding Information:
tocols that require time consuming reverse-engineering efforts. It is our hope that OCTANE will be useful for implementing and evaluating existing theoretical automotive network solutions in a standardized environment and provide the research and teaching community with an open source software platform and hardware setup guidelines to enable sharing of information. Acknowledgments This work was support in part by National Science Foundation grant NSF CNS-1205453. References
Publisher Copyright:
© 2013 USENIX Association. All rights reserved.
PY - 2013
Y1 - 2013
N2 - Security research and teaching using cyber-physical systems (e.g., automotive networks) is challenging because of the need to replicate the interactions between the hardware components and the control software of the systems. These interactions are challenging to replicate because of the dynamic inputs in real-world environments that cause various interactions of the hardware components and control software within the network. In particular, automotive networks are challenging for security research and teaching because although the protocols of the automotive networks are standardized (e.g., CAN, LIN), the implementation details by each automotive manufacturer are not standardized and are generally not publicly available. In this paper we present Open Car Testbed And Network Experiments (OCTANE), which reduces the barrier of entry into the security research and teaching of automotive networks by providing a software package and a hardware framework for the reverse engineering and testing of automotive networks. OCTANE provides a platform for security research and teaching by replicating the interactions between the hardware components and control software of the systems so that the user can focus on the security aspects of the automotive network instead of the tool configuration and setup.
AB - Security research and teaching using cyber-physical systems (e.g., automotive networks) is challenging because of the need to replicate the interactions between the hardware components and the control software of the systems. These interactions are challenging to replicate because of the dynamic inputs in real-world environments that cause various interactions of the hardware components and control software within the network. In particular, automotive networks are challenging for security research and teaching because although the protocols of the automotive networks are standardized (e.g., CAN, LIN), the implementation details by each automotive manufacturer are not standardized and are generally not publicly available. In this paper we present Open Car Testbed And Network Experiments (OCTANE), which reduces the barrier of entry into the security research and teaching of automotive networks by providing a software package and a hardware framework for the reverse engineering and testing of automotive networks. OCTANE provides a platform for security research and teaching by replicating the interactions between the hardware components and control software of the systems so that the user can focus on the security aspects of the automotive network instead of the tool configuration and setup.
UR - http://www.scopus.com/inward/record.url?scp=85084160847&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85084160847&partnerID=8YFLogxK
M3 - Paper
AN - SCOPUS:85084160847
Y2 - 12 August 2013
ER -